Description
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Starting in version 9.0.0 and prior to versions 9.13.10 and 10.2.0, a module friendly name could include scripts that will run during some module operations in the Persona Bar. Versions 9.13.10 and 10.2.0 contain a fix for the issue.
Published: 2026-01-27
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Immediate Patch
AI Analysis

Impact

A module friendly name in the DNN platform can embed script code that executes when the module deletion confirmation modal is displayed. This allows an attacker who can set or modify the friendly name to store malicious JavaScript that runs in the context of the site’s users, resulting in confirmation‑modal based defacement, data exfiltration, or session hijacking. The vulnerability falls under CWE‑79 and is classified as a moderate‑to‑high severity issue.

Affected Systems

The affected product is Dnn.Platform by dnnsoftware. Versions starting with 9.0.0 and continuing through just before 9.13.10, as well as all releases below 10.2.0, contain the flaw. The fix is included in Dnn.Platform 9.13.10 and later, and in 10.2.0 and later.

Risk and Exploitability

The CVSS score of 7.7 indicates a moderate‑to‑high impact, while the EPSS score of less than 1% suggests a low likelihood of widespread exploitation at this time. The vulnerability is not listed in the CISA KEV catalog. A likely attack vector involves an authenticated privileged user who can create or edit a module and set its friendly name, thereby injecting payloads that remain stored and render during future deletion interactions with the confirmation modal.

Generated by OpenCVE AI on April 18, 2026 at 01:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Dnn.Platform 9.13.10 or later, or to 10.2.0 or later, to apply the vendor fix.
  • Configure the platform to escape or sanitize output of module friendly names in the deletion confirmation modal, ensuring that any embedded script tags are treated as plain text.
  • If an immediate upgrade is not feasible, remove script content from existing module friendly names or temporarily disable the confirmation modal for untrusted modules until the upgrade can be performed.

Generated by OpenCVE AI on April 18, 2026 at 01:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-vm5q-8qww-h238 DotNetNuke.Core Vulnerable to Stored XSS in Module Deletion Confirmation Modal
History

Wed, 04 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Dnnsoftware dotnetnuke
CPEs cpe:2.3:a:dnnsoftware:dotnetnuke:*:*:*:*:*:*:*:*
Vendors & Products Dnnsoftware dotnetnuke

Wed, 28 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 28 Jan 2026 12:30:00 +0000

Type Values Removed Values Added
First Time appeared Dnnsoftware
Dnnsoftware dnn Platform
Vendors & Products Dnnsoftware
Dnnsoftware dnn Platform

Wed, 28 Jan 2026 00:00:00 +0000

Type Values Removed Values Added
Description DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Starting in version 9.0.0 and prior to versions 9.13.10 and 10.2.0, a module friendly name could include scripts that will run during some module operations in the Persona Bar. Versions 9.13.10 and 10.2.0 contain a fix for the issue.
Title DotNetNuke.Core Vulnerable to Stored XSS in Module Deletion Confirmation Modal
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H'}


Subscriptions

Dnnsoftware Dnn Platform Dotnetnuke
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-28T21:03:06.368Z

Reserved: 2026-01-27T14:51:03.058Z

Link: CVE-2026-24837

cve-icon Vulnrichment

Updated: 2026-01-28T21:02:56.949Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-28T00:15:51.050

Modified: 2026-02-04T20:11:09.863

Link: CVE-2026-24837

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T02:00:10Z

Weaknesses